SlideShare a Scribd company logo
1 of 14
Download to read offline
Md Easin 4/1/2023 1
Network security and cryptography
Title: “Cloud Computing”
Prof. TarkanYavas
Berliner Hochschule für Technik
Presented by:
• Md Easin ( 943257)
Contents:
• What is Cloud Computing
• History of Cloud Computing
• Benefit of Cloud Computing
• Types of Cloud
• Cloud Service Model
• Security on Cloud
• Popular Cloud Providers
• Conclusion
4/1/2023 Md Easin 2
4/1/2023 Md Easin 3
What is Cloud Computing?
Cloud computing refers to the delivery of
computing services—including servers, storage,
databases, networking, software, analytics, and
intelligence—over the Internet (the cloud).
Companies offer these services on a pay-as-you-
go basis, making it easier for organizations to
consume and pay for computing resources.
History of Cloud Computing
The concept of cloud computing as we know it today, however, really began to take shape in the late 1990s
and early 2000s. In 1999, Salesforce.com launched the first software as a service (SaaS) application,
allowing customers to access customer relationship management (CRM) software over the internet. In
2002, Amazon Web Services (AWS) introduced its first cloud computing offering, providing on-demand
access to computing resources such as storage, processing power, and networking.
Md Easin 4/1/2023 4
There are several benefits to using
cloud computing services:
• Cost savings
• Scalability
• Flexibility
• Reliability
• Security
Md eASIN 4/1/2023 5
Benefits of Cloud Computing
Benefits of cloud Computing Cont.
Cost savings: With cloud computing, organizations can pay for only the resources they need, when they need them, which can
result in significant cost savings.
Scalability: Cloud computing resources can be easily scaled up or down as needed, allowing organizations to quickly adjust to
changing business needs.
Flexibility: Cloud computing allows organizations to access a wide range of resources and services, which can be easily configured
and customized to meet their specific needs.
Reliability: Cloud computing services are generally highly available and reliable, with service-level agreements (SLAs) that
guarantee uptime.
Security: Cloud computing providers invest heavily in security and frequently update their systems to protect against the latest
threats.
Md Easin 4/1/2023 6
Types of Cloud
There are several types of clouds, which can be classified based on various criteria such as
the location of the infrastructure, the ownership of the infrastructure, and the delivery
model of the services. Here are some common types of clouds:
•Public Cloud
•Private Cloud
•Hybrid Cloud
•Community Cloud
Md Easin 4/1/2023 7
Cloud Service Model
There are three main types of cloud computing services:
Infrastructure as a Service (IaaS): This is the most basic type of cloud computing service and
provides access to infrastructure resources such as virtual machines, storage, and networking.
Platform as a Service (PaaS): PaaS provides a platform for developing, testing, and deploying
applications. It includes the infrastructure resources provided by IaaS, as well as additional tools
and services for developing and managing applications.
Software as a Service (SaaS): SaaS provides access to software applications over the Internet, on
a pay-as-you-go basis. Users do not need to install or maintain the software on their own devices.
Md Easin 4/1/2023 8
Security on Cloud
There are several security
measures that can be
implemented in cloud
environments to protect against
various threats:
•Access control
•Encryption
•Network security
•Infrastructure security
•Compliance
Md Easin 4/1/2023 9
Security on Cloud Cont.
Access control: Users and applications should only be granted access to resources that they are authorized to use. This
can be achieved through mechanisms such as identity and access management systems and role-based access controls.
Encryption: Sensitive data should be encrypted both at rest and in transit to prevent unauthorized access. This includes
data stored in cloud storage as well as data transmitted over networks.
Network security: Network security measures such as firewalls, virtual private networks (VPNs), and intrusion detection
and prevention systems can help protect against network-based attacks.
Infrastructure security: Cloud providers should implement measures to secure the physical infrastructure that supports
their services, such as data centers and servers.
Compliance: Organizations should ensure that their use of cloud services complies with relevant laws, regulations, and
industry standards. This includes implementing measures to protect personal data in accordance with data protection
laws such as the EU's General Data Protection Regulation (GDPR).
Md Easin 4/1/2023 10
Popular Cloud Computing Providers
4/1/2023 Md Easin 11
Some of
the most
popular
cloud
computing
providers
include:
Amazon Web Services (AWS): AWS is the largest and most popular cloud
computing platform, offering a wide range of services including compute,
storage, database, analytics, machine learning, and more.
Microsoft Azure: Azure is a cloud computing platform and infrastructure
created by Microsoft for building, deploying, and managing applications
and services through a global network of Microsoft-managed data centers.
Google Cloud Platform: Google Cloud Platform is a cloud computing
platform and infrastructure created by Google for building, deploying, and
managing applications and services.
IBM Cloud: IBM Cloud is a cloud computing platform and infrastructure
created by IBM for building, deploying, and managing applications and
services.
Conclusion
Cloud computing has revolutionized the way organizations consume and pay for computing
resources, providing significant cost savings, scalability, flexibility, reliability, and security. With a
wide range of services and providers to choose from, it is easier than ever for organizations to take
advantage of the benefits of the cloud.
Md Easin 4/1/2023 12
References:
13
• https://www.stackscale.com/blog/cloud-service-
models/
• https://forum.huawei.com/enterprise/en/cloud-
computing-upcoming-security-challenges-huawei-
launches-tics/thread/742007-893
• https://www.researchgate.net/figure/The-history-of-
Cloud-Computing_fig3_311911547
• https://www.linkedin.com/pulse/benefits-cloud-
computing-james-mwangi?trk=public_profile_article_view
14

More Related Content

What's hot

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providers
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat Bodage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 

Similar to Cloud Computing Overview

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxMuhammadArslan799356
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingEr. Saba karim
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computingSuranga Nisiwasala
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembeShibwabo Christopher Anyembe
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...IBM India Smarter Computing
 
A220113
A220113A220113
A220113irjes
 

Similar to Cloud Computing Overview (20)

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
H046053944
H046053944H046053944
H046053944
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
Cloud Security Guidance: IBM Recommendations For The Implementation Of Cloud ...
 
G0314043
G0314043G0314043
G0314043
 
A220113
A220113A220113
A220113
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 

Cloud Computing Overview

  • 1. Md Easin 4/1/2023 1 Network security and cryptography Title: “Cloud Computing” Prof. TarkanYavas Berliner Hochschule für Technik Presented by: • Md Easin ( 943257)
  • 2. Contents: • What is Cloud Computing • History of Cloud Computing • Benefit of Cloud Computing • Types of Cloud • Cloud Service Model • Security on Cloud • Popular Cloud Providers • Conclusion 4/1/2023 Md Easin 2
  • 3. 4/1/2023 Md Easin 3 What is Cloud Computing? Cloud computing refers to the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (the cloud). Companies offer these services on a pay-as-you- go basis, making it easier for organizations to consume and pay for computing resources.
  • 4. History of Cloud Computing The concept of cloud computing as we know it today, however, really began to take shape in the late 1990s and early 2000s. In 1999, Salesforce.com launched the first software as a service (SaaS) application, allowing customers to access customer relationship management (CRM) software over the internet. In 2002, Amazon Web Services (AWS) introduced its first cloud computing offering, providing on-demand access to computing resources such as storage, processing power, and networking. Md Easin 4/1/2023 4
  • 5. There are several benefits to using cloud computing services: • Cost savings • Scalability • Flexibility • Reliability • Security Md eASIN 4/1/2023 5 Benefits of Cloud Computing
  • 6. Benefits of cloud Computing Cont. Cost savings: With cloud computing, organizations can pay for only the resources they need, when they need them, which can result in significant cost savings. Scalability: Cloud computing resources can be easily scaled up or down as needed, allowing organizations to quickly adjust to changing business needs. Flexibility: Cloud computing allows organizations to access a wide range of resources and services, which can be easily configured and customized to meet their specific needs. Reliability: Cloud computing services are generally highly available and reliable, with service-level agreements (SLAs) that guarantee uptime. Security: Cloud computing providers invest heavily in security and frequently update their systems to protect against the latest threats. Md Easin 4/1/2023 6
  • 7. Types of Cloud There are several types of clouds, which can be classified based on various criteria such as the location of the infrastructure, the ownership of the infrastructure, and the delivery model of the services. Here are some common types of clouds: •Public Cloud •Private Cloud •Hybrid Cloud •Community Cloud Md Easin 4/1/2023 7
  • 8. Cloud Service Model There are three main types of cloud computing services: Infrastructure as a Service (IaaS): This is the most basic type of cloud computing service and provides access to infrastructure resources such as virtual machines, storage, and networking. Platform as a Service (PaaS): PaaS provides a platform for developing, testing, and deploying applications. It includes the infrastructure resources provided by IaaS, as well as additional tools and services for developing and managing applications. Software as a Service (SaaS): SaaS provides access to software applications over the Internet, on a pay-as-you-go basis. Users do not need to install or maintain the software on their own devices. Md Easin 4/1/2023 8
  • 9. Security on Cloud There are several security measures that can be implemented in cloud environments to protect against various threats: •Access control •Encryption •Network security •Infrastructure security •Compliance Md Easin 4/1/2023 9
  • 10. Security on Cloud Cont. Access control: Users and applications should only be granted access to resources that they are authorized to use. This can be achieved through mechanisms such as identity and access management systems and role-based access controls. Encryption: Sensitive data should be encrypted both at rest and in transit to prevent unauthorized access. This includes data stored in cloud storage as well as data transmitted over networks. Network security: Network security measures such as firewalls, virtual private networks (VPNs), and intrusion detection and prevention systems can help protect against network-based attacks. Infrastructure security: Cloud providers should implement measures to secure the physical infrastructure that supports their services, such as data centers and servers. Compliance: Organizations should ensure that their use of cloud services complies with relevant laws, regulations, and industry standards. This includes implementing measures to protect personal data in accordance with data protection laws such as the EU's General Data Protection Regulation (GDPR). Md Easin 4/1/2023 10
  • 11. Popular Cloud Computing Providers 4/1/2023 Md Easin 11 Some of the most popular cloud computing providers include: Amazon Web Services (AWS): AWS is the largest and most popular cloud computing platform, offering a wide range of services including compute, storage, database, analytics, machine learning, and more. Microsoft Azure: Azure is a cloud computing platform and infrastructure created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. Google Cloud Platform: Google Cloud Platform is a cloud computing platform and infrastructure created by Google for building, deploying, and managing applications and services. IBM Cloud: IBM Cloud is a cloud computing platform and infrastructure created by IBM for building, deploying, and managing applications and services.
  • 12. Conclusion Cloud computing has revolutionized the way organizations consume and pay for computing resources, providing significant cost savings, scalability, flexibility, reliability, and security. With a wide range of services and providers to choose from, it is easier than ever for organizations to take advantage of the benefits of the cloud. Md Easin 4/1/2023 12
  • 13. References: 13 • https://www.stackscale.com/blog/cloud-service- models/ • https://forum.huawei.com/enterprise/en/cloud- computing-upcoming-security-challenges-huawei- launches-tics/thread/742007-893 • https://www.researchgate.net/figure/The-history-of- Cloud-Computing_fig3_311911547 • https://www.linkedin.com/pulse/benefits-cloud- computing-james-mwangi?trk=public_profile_article_view
  • 14. 14