SlideShare a Scribd company logo
J A W A D H A S A N ( 5 5 6 )
R A N A M U H A M M A D A D N A N A K B A R ( 5 4 0 )
M A L I K A B I D H U S S A I N ( 5 3 7 )
Network Dependency.
Security & Privacy.
Cost of bandwidth.
Trust on cloud provider.
Limited control.
Centralization.
Network Dependency
Cloud computing is dependent on the internet.
The most basic drawback of cloud computing is that
you need internet connection to access the cloud and
this direct tie to the internet means that this system is
prone to outages and service interruptions at any time.
This could occur in the middle of a task or transaction,
meaning the action could be delayed or lost entirely if
time sensitive.
Security & Privacy
There is already a huge risk with data hosted in-house, so
it’s no secret that data offsite sits at even higher risk. With Data
offsite, more avenues for attack and the fact that it will be
traveling more makes it easier to be intercepted. With
technology always improving, there are ways to make sure
of better encryption. However with technology always
improving, there are always people out there improving their
hacking skills.
Cost of Bandwidth
We are switching to the cloud computing to reduce our
cost but we spend more money in cloud computing. Look at
the scenario , we are switching to the cloud computing, we will
pay to the Cloud Provider and we will also pay to Internet
Service Provider (ISP). As we need high speed internet
connection So , we have to pay more for High Bandwidth to
ISP.
Trust on Cloud Provider
We have to trust on the internet provider. Our data is very
important. We going to give out data to the third person. We
should think about it. Is the person we are going to trust is the
trustable. Is the Cloud Provider is not our competitive from any
side. Cloud provider has the administrative rights to do
anything.
Limited Control
We can perform limited operations to our files. Clint has
the limited control to the application. The Cloud Provider can
delete or update any application but we have not the ability to
delete or update the application. We just have to use the
provided version of the software. If we have our system on
desktop we can easily update our software or change the
software.
Centralization
Organizations usually outsource data and
application services to a centralized provider. In cloud
computing, we know that network dependency is a
drawback due to outages. Centralized data can
certainly add another risk to cloud computing: If the
provider’s service goes down, all clients are affected.
Questions
Which storage medium used in cloud ?
Is data stored in clouds or not?
Questions
What is the difference between
File Server & Cloud Storage?
Questions
Can we say internet is Cloud ?
Why or Why not ?
Questions
How can you say that Cloud Computing
Saves our money?
Questions
As a Cloud Provider
How can I create our Cloud ?
Thank You!

More Related Content

What's hot

eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
Netpluz Asia Pte Ltd
 
What is the safest vpn to use
What is the safest vpn to useWhat is the safest vpn to use
What is the safest vpn to use
Sathish Kumar M
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Netskope
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
Cloudflare
 
5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur
Cristina Collado
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
Lora O'Haver
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
Netskope
 
BeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence GapBeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence Gap
Ivan Dwyer
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
Cloudflare
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
Abhishek Tripathi
 
Top Security Predictions for 2015
Top Security Predictions for 2015Top Security Predictions for 2015
Top Security Predictions for 2015
Juniper Networks
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
MassTLC
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
Cloudflare
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
Tripwire
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
Cloudflare
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletin
David Sweigert
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 

What's hot (20)

eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
What is the safest vpn to use
What is the safest vpn to useWhat is the safest vpn to use
What is the safest vpn to use
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur5 examples of how easily data leaks can occur
5 examples of how easily data leaks can occur
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
BeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence GapBeyondCorp: Closing the Adherence Gap
BeyondCorp: Closing the Adherence Gap
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
Top Security Predictions for 2015
Top Security Predictions for 2015Top Security Predictions for 2015
Top Security Predictions for 2015
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Risks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletinRisks to Cloud based critical infrastructure -- DHS bulletin
Risks to Cloud based critical infrastructure -- DHS bulletin
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 

Viewers also liked

Fusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice SchemeFusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice SchemeNancy Sutton-Professional
 
Trucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejorTrucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejor
IMSolutions
 
Informe EGM- 3er acumulado 2013 22gradosº
Informe  EGM- 3er acumulado 2013 22gradosº  Informe  EGM- 3er acumulado 2013 22gradosº
Informe EGM- 3er acumulado 2013 22gradosº 22gradosº
 
Memoria Cineclubista PE
Memoria Cineclubista PEMemoria Cineclubista PE
Memoria Cineclubista PE
Memória FEPEC
 
Top 10 Internet Trends 2011
Top 10 Internet Trends 2011Top 10 Internet Trends 2011
Top 10 Internet Trends 2011
Jürg Stuker
 
Estrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isbEstrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isb
Ditto Silva
 
apoksiomen-de-en
apoksiomen-de-enapoksiomen-de-en
apoksiomen-de-enAna Nikolic
 
True stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual ReportTrue stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual Report
Allianz Global Assistance
 
Blog de motos
Blog de motosBlog de motos
Blog de motos
Motos2015
 
Formacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad CompartidaFormacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad Compartidaguest1c9ac82
 
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...
Ramon Costa i Pujol
 
Curso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto VercherCurso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto Vercher
MÓNICA M. SOTO VERCHER
 
Vitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciencesVitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciences
Anju Jethani
 
Blazek - Legal Framework
Blazek - Legal FrameworkBlazek - Legal Framework
Blazek - Legal FrameworkJan Fried
 
How do social technologies change knowledge worker business processes km me...
How do social technologies change knowledge worker business processes   km me...How do social technologies change knowledge worker business processes   km me...
How do social technologies change knowledge worker business processes km me...Martin Sumner-Smith
 
UniCall - prezentace společnosti
UniCall - prezentace společnosti  UniCall - prezentace společnosti
UniCall - prezentace společnosti
UniCall Communication Group
 
Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...
SalesQualia
 

Viewers also liked (20)

Fusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice SchemeFusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
Fusion21/CITB Merseyside & Cheshire Shared Apprentice Scheme
 
Trucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejorTrucos y tratos para cobrar más y mejor
Trucos y tratos para cobrar más y mejor
 
Yearning voices
Yearning voicesYearning voices
Yearning voices
 
Informe EGM- 3er acumulado 2013 22gradosº
Informe  EGM- 3er acumulado 2013 22gradosº  Informe  EGM- 3er acumulado 2013 22gradosº
Informe EGM- 3er acumulado 2013 22gradosº
 
Memoria Cineclubista PE
Memoria Cineclubista PEMemoria Cineclubista PE
Memoria Cineclubista PE
 
Top 10 Internet Trends 2011
Top 10 Internet Trends 2011Top 10 Internet Trends 2011
Top 10 Internet Trends 2011
 
Estrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isbEstrategias de marketing en Redes 2.0 para el isb
Estrategias de marketing en Redes 2.0 para el isb
 
apoksiomen-de-en
apoksiomen-de-enapoksiomen-de-en
apoksiomen-de-en
 
True stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual ReportTrue stories booklet - Allianz Global Assistance 2010 Annual Report
True stories booklet - Allianz Global Assistance 2010 Annual Report
 
Blog de motos
Blog de motosBlog de motos
Blog de motos
 
Formacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad CompartidaFormacion De Especialistas Responsabilidad Compartida
Formacion De Especialistas Responsabilidad Compartida
 
Ponto+pd buro2013
Ponto+pd buro2013Ponto+pd buro2013
Ponto+pd buro2013
 
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...Herramientas de comunicación web 2.0 en la dirección de proyectos   cio 2009 ...
Herramientas de comunicación web 2.0 en la dirección de proyectos cio 2009 ...
 
Curso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto VercherCurso de rescatadores. Apuntes2013. Soto Vercher
Curso de rescatadores. Apuntes2013. Soto Vercher
 
Vitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciencesVitalism & its acceptance in modern sciences
Vitalism & its acceptance in modern sciences
 
Blazek - Legal Framework
Blazek - Legal FrameworkBlazek - Legal Framework
Blazek - Legal Framework
 
How do social technologies change knowledge worker business processes km me...
How do social technologies change knowledge worker business processes   km me...How do social technologies change knowledge worker business processes   km me...
How do social technologies change knowledge worker business processes km me...
 
Edad media vocal
Edad media vocalEdad media vocal
Edad media vocal
 
UniCall - prezentace společnosti
UniCall - prezentace společnosti  UniCall - prezentace společnosti
UniCall - prezentace společnosti
 
Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...Startup Selling: How to sell if you really, really have to and don't know how...
Startup Selling: How to sell if you really, really have to and don't know how...
 

Similar to Cloud computing disadvantages

9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
kairostech
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing WorksJason Robinson
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration
Protected Harbor
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_asMasood Shah
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
Salam Shah
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
Impressico Business Solutions
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 

Similar to Cloud computing disadvantages (20)

9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
How Cloud Computing Works
How Cloud Computing WorksHow Cloud Computing Works
How Cloud Computing Works
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_as
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 

More from Muhammad Zubair

Cloud computing
Cloud computingCloud computing
Cloud computing
Muhammad Zubair
 
Lecture10
Lecture10Lecture10
Lecture10
Muhammad Zubair
 
Lecture9 recursion
Lecture9 recursionLecture9 recursion
Lecture9 recursion
Muhammad Zubair
 
Lecture8
Lecture8Lecture8
Lecture8
Muhammad Zubair
 
Lecture7
Lecture7Lecture7
Lecture7
Muhammad Zubair
 
Lecture6
Lecture6Lecture6
Lecture6
Muhammad Zubair
 
Lecture5
Lecture5Lecture5
Lecture5
Muhammad Zubair
 
Lecture4
Lecture4Lecture4
Lecture4
Muhammad Zubair
 
Lecture3
Lecture3Lecture3
Lecture3
Muhammad Zubair
 
Lecture3
Lecture3Lecture3
Lecture3
Muhammad Zubair
 
Lecture2
Lecture2Lecture2
Lecture2
Muhammad Zubair
 
Lecture1
Lecture1Lecture1
Lecture1
Muhammad Zubair
 
Indin report by zubair
Indin report by zubairIndin report by zubair
Indin report by zubair
Muhammad Zubair
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 

More from Muhammad Zubair (14)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Lecture10
Lecture10Lecture10
Lecture10
 
Lecture9 recursion
Lecture9 recursionLecture9 recursion
Lecture9 recursion
 
Lecture8
Lecture8Lecture8
Lecture8
 
Lecture7
Lecture7Lecture7
Lecture7
 
Lecture6
Lecture6Lecture6
Lecture6
 
Lecture5
Lecture5Lecture5
Lecture5
 
Lecture4
Lecture4Lecture4
Lecture4
 
Lecture3
Lecture3Lecture3
Lecture3
 
Lecture3
Lecture3Lecture3
Lecture3
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture1
Lecture1Lecture1
Lecture1
 
Indin report by zubair
Indin report by zubairIndin report by zubair
Indin report by zubair
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Cloud computing disadvantages

  • 1.
  • 2. J A W A D H A S A N ( 5 5 6 ) R A N A M U H A M M A D A D N A N A K B A R ( 5 4 0 ) M A L I K A B I D H U S S A I N ( 5 3 7 )
  • 3. Network Dependency. Security & Privacy. Cost of bandwidth. Trust on cloud provider. Limited control. Centralization.
  • 4. Network Dependency Cloud computing is dependent on the internet. The most basic drawback of cloud computing is that you need internet connection to access the cloud and this direct tie to the internet means that this system is prone to outages and service interruptions at any time. This could occur in the middle of a task or transaction, meaning the action could be delayed or lost entirely if time sensitive.
  • 5. Security & Privacy There is already a huge risk with data hosted in-house, so it’s no secret that data offsite sits at even higher risk. With Data offsite, more avenues for attack and the fact that it will be traveling more makes it easier to be intercepted. With technology always improving, there are ways to make sure of better encryption. However with technology always improving, there are always people out there improving their hacking skills.
  • 6. Cost of Bandwidth We are switching to the cloud computing to reduce our cost but we spend more money in cloud computing. Look at the scenario , we are switching to the cloud computing, we will pay to the Cloud Provider and we will also pay to Internet Service Provider (ISP). As we need high speed internet connection So , we have to pay more for High Bandwidth to ISP.
  • 7. Trust on Cloud Provider We have to trust on the internet provider. Our data is very important. We going to give out data to the third person. We should think about it. Is the person we are going to trust is the trustable. Is the Cloud Provider is not our competitive from any side. Cloud provider has the administrative rights to do anything.
  • 8. Limited Control We can perform limited operations to our files. Clint has the limited control to the application. The Cloud Provider can delete or update any application but we have not the ability to delete or update the application. We just have to use the provided version of the software. If we have our system on desktop we can easily update our software or change the software.
  • 9. Centralization Organizations usually outsource data and application services to a centralized provider. In cloud computing, we know that network dependency is a drawback due to outages. Centralized data can certainly add another risk to cloud computing: If the provider’s service goes down, all clients are affected.
  • 10. Questions Which storage medium used in cloud ? Is data stored in clouds or not?
  • 11. Questions What is the difference between File Server & Cloud Storage?
  • 12. Questions Can we say internet is Cloud ? Why or Why not ?
  • 13. Questions How can you say that Cloud Computing Saves our money?
  • 14. Questions As a Cloud Provider How can I create our Cloud ?