SlideShare a Scribd company logo
Presented By:
Jyoti Srivastava
1106065
IT1
Outline:
1. What is cloud computing?
2. Characteristics of cloud computing
3. Cloud architecture
4. Services of cloud computing
5. Cloud computing service layers
6. Types of cloud computing
7. Working of cloud computing
8. Data controller’s responsibility
9. Contractual issues
10. Data protection
11. Privacy data protection
12. Conclusion
13. References
What is cloud computing?
 Cloud computing is a set of IT services that are provided to a customer over a
network on a leased basis and with the ability to scale up or down their service
requirements.
 Cloud computing is a new approach that reduces IT complexity by leveraging the
efficient pooling of on-demand, self-managed virtual infrastructure, consumed as a
service.
 Cloud computing involves deploying groups of remote servers and
software networks that allow centralized data storage and online access to
computer services or resources.
 Cloud computing is an umbrella term used to refer to Internet based development
and services
Contd..
 cloud computing provides a variety of computing resources , from servers and storage to
enterprise applications such as email, security, backup/DR, voice, all delivered over the Internet.
The Cloud delivers a hosting environment that is immediate, flexible, scalable, secure, and available
– while saving corporations money, time and resources.
Characteristics of cloud computing
 Common characteristics:
 Essential characteristics:
Massive Scale Resilient Computing
Low Cost Software
Virtualization Service Orientation
Advanced Security
Homogeneity Geographic Distribution
Resource Pooling
Broad Network Access Rapid Elasticity
Measured Service
On Demand Self-Service
Cloud architecture:
 It refers to the components and subcomponents required for cloud computing. These
components typically consist of a front end platform (fat client, thin client, mobile device),
back end platforms (servers, storage), a cloud based delivery, and a network (Internet,
Intranet, Intercloud). Combined, these components make up cloud computing architecture.
services of cloud computing:
Cloud computing service layers:
services Description
Services
Application
Development
Platform
Storage
Hosting
Services – Complete business services such as PayPal,
OpenID , OAuth , Google Maps, Alexa.
Application – Cloud based software that eliminates
the need for local installation such as Google Apps,
Microsoft Online
Storage – Data storage or cloud based NAS such as
CTERA, iDisk, CloudNAS.
Development – Software development platforms used
to build custom cloud based applications (PAAS &
SAAS) such as SalesForce.
Platform – Cloud based platforms, typically provided
using virtualization, such as Amazon ECC, Sun Grid
Hosting – Physical data centers such as those run by
IBM, HP, NaviSite , etc.
Application
Focused
Infrastructure
Focused
Types of cloud computing:
Working of cloud computing:
Cloud Computing system can be divided it
into two section:
1. The front end
2. The back end.
The front end is the side the computer
user, or client, sees . The back end is
the "cloud" section of the system. On the
back end there are various computers ,
servers and data storage systems that
create the "cloud" of computing services .
A central server administers the system,
monitoring traffic and client demands to
ensure everything runs smoothly.
Data controller’s responsibility:
 Data processing by third parties:
According to Swiss data protection law, the data controller must therefore ensure that an
appointed third party (data processor) only processes data in such a way as the data controller
himself would be permitted to.
 Transferring personal data abroad:
According to these, exporting data abroad is permissible if legislation that ensures adequate data
protection in accordance with Swiss standards exists in the country in which the recipient of the
data is located.
 Data security:
It includes the protection of systems and data from the risks of unauthorized or arbitrary
destruction, arbitrary loss, technical faults, forgery, theft and unlawful use, as well as from
unauthorized modification, copying, access or other unauthorized processing.
CONTRACTUAL ISSUES:
 In cloud computing the legal responsibility for data processing is borne by the user, who enlists
the services of a cloud service provider. The user is the data collector. As in all other cases in
which a third party is given the task of processing personal data.
Particular attention must be paid to the following points in a contract with a cloud
service provider:
 Scope of processing
The type of data processing permissible by the provider is to be clearly specified, and the
purpose for which the data may be processed.
 Subcontractors:
The conditions under which the provider may for his part pass on the data to subcontractors
have to be defined, for example, to a provider of storage capacity.
 Deletion of data :
An essential point is that data that has to be deleted by the user because he or she no longer
needs it or may no longer process it for another reason is also deleted by the provider and no
more copies of data are available. This can lead to problems, in particular in connection with
backups that are created by the provider.
Contd…
 Data security measures:
The organizational and technical data security measures that are to be taken by the provider are to
be stipulated in the contract, such as the access rights of the provider's employees to data and the
systems used to process them, or the encryption of data during transmission or storage, or both.
 Localization of data:
To enable fulfillment of the requirements in connection with the export of data, the customer must
know in which countries the servers are deployed on which the data is processed and stored and
the provider is to be under an obligation not to transfer the data to any other countries without
prior consultation with the user.
 Service level agreements:
According to the purpose for which the data is processed it is important to agree on binding service
levels for availability and data recovery and if necessary, safeguarded by supporting fixed penalties
in the event of non-compliance with the agreed service levels.
 Audits:
By agreeing on information and audit rights, the user establishes the opportunity to verify that the
obligations entered into by the provider are being fulfilled.
Data Protection:
Data stored in the cloud typically resides in a shared environment collocated with data from other
customers.
 Data Isolation:
Data can take many forms. For example, for cloud-based application development, it includes the
application programs, scripts, and configuration settings, along with the development tools. For
deployed applications, it includes records and other content created or used by the applications, as
well as account information about the users of the applications.
 Data Sanitization:
The data sanitization practices that a service provider implements have obvious implications for
security. Sanitization is the removal of sensitive data from a storage device in various situations,
such as when a storage device is removed from service or moved elsewhere to be stored. It also
applies to backup copies made for recovery and restoration of service, and residual data remaining
upon termination of service.
 Data Location:
Use of an in-house computing center allows an organization to structure its computing
environment and know in detail where data is stored and the safeguards used to protect the data.
Privacy data protection:
 Data Encrypt:
Encryption is, so far, the best way you can protect your data. Generally encryption works as follows:
You have a file you want to move to a cloud, you use certain software with which you create a
password for that file, you move that password-protected file to the cloud and no one is ever able
to see the content of the file not knowing the password.
 Use an encrypted cloud service:
There are some cloud services that provide local encryption and decryption of your files in addition
to storage and backup. It means that the service takes care of both encrypting your files on your
own computer and storing them safely on the cloud.
 Read the user agreement to find out how your cloud service storage
works:
If you are not sure what cloud storage to choose or if you have any questions as for how that or
another cloud service works you can read the user agreement of the service you are planning to
sign up for. There is no doubt it's hard and boring but you really need to face those text volumes.
Conclusion:
 Cloud Computing builds on decades of research in virtualization, distributed computing,
utility computing, and more recently networking, web and software services.
 It implies a service oriented architecture, reduced information technology overhead for
the end-user, great flexibility, reduced total cost of ownership, on-demand services
and many other things.
 Cloud Computing increases profitability by improving resource utilization. Costs are
driven down by delivering appropriate resources only for the time those resources are
needed.
References:
[1] Anita Campbell (2008-08-31). “Cloud Computing-Get Used to the Term” The App
Gap. http://www.theappgap.com
[2] http://searchsecurity.techtarget.com/magOnline/0,sid14_gci1349551.html.
[3] J. Brodkin. (2008, Jun.). “Gartner: Seven cloud-computing security risks.” InfoWorld,
Available: <http://www.infoworld.com/d/security-central/gartner-seven-
cloudcomputingsecurity-risks-853?page=0,1> [Mar. 13, 2009].
[4] Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version
3.0,"2010.
[5] http://webjcli.org/article/view/303/418
[6] Adobe Systems Inc., "Adobe Flex Framework Technologies", 2011,
http://labs.adobe.com/technologies/flex.
Cloud computing and its security issues

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
Siddiq Abu Bakkar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
kanchu17
 
Cloud security
Cloud securityCloud security
Cloud security
Tushar Kayande
 
Cloud computing information management
Cloud computing   information managementCloud computing   information management
Cloud computing information management
Hallmark B-school
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
prachupanchal
 
Cloud security
Cloud security Cloud security
Cloud security
Mohamed Shalash
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computingkevnikool
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Jithin Parakka
 
Cloud computing
Cloud computingCloud computing
Cloud computing
MOHIT PANDEY
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnitinw25
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Cloud computing presentation
Cloud computing presentation  Cloud computing presentation
Cloud computing presentation
hemanth S R
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
Amritpal Singh Bedi
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing information management
Cloud computing   information managementCloud computing   information management
Cloud computing information management
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing presentation
Cloud computing presentation  Cloud computing presentation
Cloud computing presentation
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 

Similar to Cloud computing and its security issues

Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computing
Kashif Bhatti
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
khan593595
 
Cloud computing
Cloud computingCloud computing
Cloud computing
hundejibat
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
TSplusIndia
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
Sitamarhi Institute of Technology
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Nibi Maouriyan
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
IJERA Editor
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
Protelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
Protelion
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
Techsparks
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journals
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
ronak patel
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
Er Piyush Gupta IN ⊞⌘
 

Similar to Cloud computing and its security issues (20)

Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computing
 
Chapter 1.pdf
Chapter 1.pdfChapter 1.pdf
Chapter 1.pdf
 
02 05 d_51_cc_efiles
02 05 d_51_cc_efiles02 05 d_51_cc_efiles
02 05 d_51_cc_efiles
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
 
Module-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdfModule-1 introductaion cloud computing.pdf
Module-1 introductaion cloud computing.pdf
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
Cloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and TerminologiesCloud computing and Cloud Security - Basics and Terminologies
Cloud computing and Cloud Security - Basics and Terminologies
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 

Cloud computing and its security issues

  • 2. Outline: 1. What is cloud computing? 2. Characteristics of cloud computing 3. Cloud architecture 4. Services of cloud computing 5. Cloud computing service layers 6. Types of cloud computing 7. Working of cloud computing 8. Data controller’s responsibility 9. Contractual issues 10. Data protection 11. Privacy data protection 12. Conclusion 13. References
  • 3. What is cloud computing?  Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements.  Cloud computing is a new approach that reduces IT complexity by leveraging the efficient pooling of on-demand, self-managed virtual infrastructure, consumed as a service.  Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources.  Cloud computing is an umbrella term used to refer to Internet based development and services
  • 4. Contd..  cloud computing provides a variety of computing resources , from servers and storage to enterprise applications such as email, security, backup/DR, voice, all delivered over the Internet. The Cloud delivers a hosting environment that is immediate, flexible, scalable, secure, and available – while saving corporations money, time and resources.
  • 5. Characteristics of cloud computing  Common characteristics:  Essential characteristics: Massive Scale Resilient Computing Low Cost Software Virtualization Service Orientation Advanced Security Homogeneity Geographic Distribution Resource Pooling Broad Network Access Rapid Elasticity Measured Service On Demand Self-Service
  • 6. Cloud architecture:  It refers to the components and subcomponents required for cloud computing. These components typically consist of a front end platform (fat client, thin client, mobile device), back end platforms (servers, storage), a cloud based delivery, and a network (Internet, Intranet, Intercloud). Combined, these components make up cloud computing architecture.
  • 7. services of cloud computing:
  • 8. Cloud computing service layers: services Description Services Application Development Platform Storage Hosting Services – Complete business services such as PayPal, OpenID , OAuth , Google Maps, Alexa. Application – Cloud based software that eliminates the need for local installation such as Google Apps, Microsoft Online Storage – Data storage or cloud based NAS such as CTERA, iDisk, CloudNAS. Development – Software development platforms used to build custom cloud based applications (PAAS & SAAS) such as SalesForce. Platform – Cloud based platforms, typically provided using virtualization, such as Amazon ECC, Sun Grid Hosting – Physical data centers such as those run by IBM, HP, NaviSite , etc. Application Focused Infrastructure Focused
  • 9. Types of cloud computing:
  • 10. Working of cloud computing: Cloud Computing system can be divided it into two section: 1. The front end 2. The back end. The front end is the side the computer user, or client, sees . The back end is the "cloud" section of the system. On the back end there are various computers , servers and data storage systems that create the "cloud" of computing services . A central server administers the system, monitoring traffic and client demands to ensure everything runs smoothly.
  • 11. Data controller’s responsibility:  Data processing by third parties: According to Swiss data protection law, the data controller must therefore ensure that an appointed third party (data processor) only processes data in such a way as the data controller himself would be permitted to.  Transferring personal data abroad: According to these, exporting data abroad is permissible if legislation that ensures adequate data protection in accordance with Swiss standards exists in the country in which the recipient of the data is located.  Data security: It includes the protection of systems and data from the risks of unauthorized or arbitrary destruction, arbitrary loss, technical faults, forgery, theft and unlawful use, as well as from unauthorized modification, copying, access or other unauthorized processing.
  • 12. CONTRACTUAL ISSUES:  In cloud computing the legal responsibility for data processing is borne by the user, who enlists the services of a cloud service provider. The user is the data collector. As in all other cases in which a third party is given the task of processing personal data. Particular attention must be paid to the following points in a contract with a cloud service provider:  Scope of processing The type of data processing permissible by the provider is to be clearly specified, and the purpose for which the data may be processed.  Subcontractors: The conditions under which the provider may for his part pass on the data to subcontractors have to be defined, for example, to a provider of storage capacity.  Deletion of data : An essential point is that data that has to be deleted by the user because he or she no longer needs it or may no longer process it for another reason is also deleted by the provider and no more copies of data are available. This can lead to problems, in particular in connection with backups that are created by the provider.
  • 13. Contd…  Data security measures: The organizational and technical data security measures that are to be taken by the provider are to be stipulated in the contract, such as the access rights of the provider's employees to data and the systems used to process them, or the encryption of data during transmission or storage, or both.  Localization of data: To enable fulfillment of the requirements in connection with the export of data, the customer must know in which countries the servers are deployed on which the data is processed and stored and the provider is to be under an obligation not to transfer the data to any other countries without prior consultation with the user.  Service level agreements: According to the purpose for which the data is processed it is important to agree on binding service levels for availability and data recovery and if necessary, safeguarded by supporting fixed penalties in the event of non-compliance with the agreed service levels.  Audits: By agreeing on information and audit rights, the user establishes the opportunity to verify that the obligations entered into by the provider are being fulfilled.
  • 14. Data Protection: Data stored in the cloud typically resides in a shared environment collocated with data from other customers.  Data Isolation: Data can take many forms. For example, for cloud-based application development, it includes the application programs, scripts, and configuration settings, along with the development tools. For deployed applications, it includes records and other content created or used by the applications, as well as account information about the users of the applications.  Data Sanitization: The data sanitization practices that a service provider implements have obvious implications for security. Sanitization is the removal of sensitive data from a storage device in various situations, such as when a storage device is removed from service or moved elsewhere to be stored. It also applies to backup copies made for recovery and restoration of service, and residual data remaining upon termination of service.  Data Location: Use of an in-house computing center allows an organization to structure its computing environment and know in detail where data is stored and the safeguards used to protect the data.
  • 15. Privacy data protection:  Data Encrypt: Encryption is, so far, the best way you can protect your data. Generally encryption works as follows: You have a file you want to move to a cloud, you use certain software with which you create a password for that file, you move that password-protected file to the cloud and no one is ever able to see the content of the file not knowing the password.  Use an encrypted cloud service: There are some cloud services that provide local encryption and decryption of your files in addition to storage and backup. It means that the service takes care of both encrypting your files on your own computer and storing them safely on the cloud.  Read the user agreement to find out how your cloud service storage works: If you are not sure what cloud storage to choose or if you have any questions as for how that or another cloud service works you can read the user agreement of the service you are planning to sign up for. There is no doubt it's hard and boring but you really need to face those text volumes.
  • 16. Conclusion:  Cloud Computing builds on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services.  It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on-demand services and many other things.  Cloud Computing increases profitability by improving resource utilization. Costs are driven down by delivering appropriate resources only for the time those resources are needed.
  • 17. References: [1] Anita Campbell (2008-08-31). “Cloud Computing-Get Used to the Term” The App Gap. http://www.theappgap.com [2] http://searchsecurity.techtarget.com/magOnline/0,sid14_gci1349551.html. [3] J. Brodkin. (2008, Jun.). “Gartner: Seven cloud-computing security risks.” InfoWorld, Available: <http://www.infoworld.com/d/security-central/gartner-seven- cloudcomputingsecurity-risks-853?page=0,1> [Mar. 13, 2009]. [4] Cloud Computing Use Case Discussion Group. "Cloud Computing UseCases Version 3.0,"2010. [5] http://webjcli.org/article/view/303/418 [6] Adobe Systems Inc., "Adobe Flex Framework Technologies", 2011, http://labs.adobe.com/technologies/flex.