SlideShare a Scribd company logo
1 of 54
INTRODUCTION
What is Cloud Computing?
B.Tech CSE - NMREC - CLOUD SECURITY 3
What is Cloud Computing?
B.Tech CSE - NMREC - CLOUD SECURITY 4
Everything on the
cloud
B.Tech CSE - NMREC - CLOUD SECURITY 5
Why Cloud Computing
B.Tech CSE - NMREC - CLOUD SECURITY 6
History and Origins
B.Tech CSE - NMREC - CLOUD SECURITY 7
Essential Characteristics Cloud Computing
B.Tech CSE - NMREC - CLOUD SECURITY 8
B.Tech CSE - NMREC - CLOUD SECURITY 9
Cloud Service Layers
B.Tech CSE - NMREC - CLOUD SECURITY 10
Cloud Service Models Definition
B.Tech CSE - NMREC - CLOUD SECURITY 11
Cloud Service Models
Characteristics
B.Tech CSE - NMREC - CLOUD SECURITY 12
Inside a CLoud
B.Tech CSE - NMREC - CLOUD SECURITY 13
B.Tech CSE - NMREC - CLOUD SECURITY 14
Cloud Service Models Comparision
B.Tech CSE - NMREC - CLOUD SECURITY 15
Cloud Implementation Types
B.Tech CSE - NMREC - CLOUD SECURITY 16
Public Cloud
B.Tech CSE - NMREC - CLOUD SECURITY 17
Private Cloud
B.Tech CSE - NMREC - CLOUD SECURITY 18
Community Cloud
B.Tech CSE - NMREC - CLOUD SECURITY 19
Hybrid Cloud
B.Tech CSE - NMREC - CLOUD SECURITY 20
B.Tech CSE - NMREC - CLOUD SECURITY 21
B.Tech CSE - NMREC - CLOUD SECURITY 22
B.Tech CSE - NMREC - CLOUD SECURITY 23
B.Tech CSE - NMREC - CLOUD SECURITY 24
B.Tech CSE - NMREC - CLOUD SECURITY 25
B.Tech CSE - NMREC - CLOUD SECURITY 26
B.Tech CSE - NMREC - CLOUD SECURITY 27
B.Tech CSE - NMREC - CLOUD SECURITY 28
B.Tech CSE - NMREC - CLOUD SECURITY 29
B.Tech CSE - NMREC - CLOUD SECURITY 30
B.Tech CSE - NMREC - CLOUD SECURITY 31
B.Tech CSE - NMREC - CLOUD SECURITY 32
B.Tech CSE - NMREC - CLOUD SECURITY 33
B.Tech CSE - NMREC - CLOUD SECURITY 34
B.Tech CSE - NMREC - CLOUD SECURITY 35
B.Tech CSE - NMREC - CLOUD SECURITY 36
B.Tech CSE - NMREC - CLOUD SECURITY 37
B.Tech CSE - NMREC - CLOUD SECURITY 38
B.Tech CSE - NMREC - CLOUD SECURITY 39
B.Tech CSE - NMREC - CLOUD SECURITY 40
B.Tech CSE - NMREC - CLOUD SECURITY 41
B.Tech CSE - NMREC - CLOUD SECURITY 42
B.Tech CSE - NMREC - CLOUD SECURITY 43
Cloud Computing
Architecture
B.Tech CSE - NMREC - CLOUD SECURITY 44
As we know, cloud computing technology
is used by both small and large organizations to store the
information in cloud and access it from anywhere at any
time using the internet connection.
• Cloud computing architecture is a combination
of service-oriented architecture and event-driven
architecture.
• Cloud computing architecture is divided into the
following two parts –
o Front End
o Back End
B.Tech CSE - NMREC - CLOUD SECURITY 45
The below diagram shows the architecture of cloud
computing -
B.Tech CSE - NMREC - CLOUD SECURITY 46
Front End
The front end is used by the client. It contains client-side
interfaces and applications that are required to access the
cloud computing platforms. The front end includes web
servers (including Chrome, Firefox, internet explorer,
etc.), thin & fat clients, tablets, and mobile devices.
Back End
The back end is used by the service provider. It manages
all the resources that are required to provide cloud
computing services. It includes a huge amount of data
storage, security mechanism, virtual machines, deploying
models, servers, traffic control mechanisms, etc.
B.Tech CSE - NMREC - CLOUD SECURITY 47
Components of Cloud Computing
Architecture
There are the following components of cloud computing
architecture -
a. Client Infrastructure
Client Infrastructure is a Front end component. It
provides GUI (Graphical User Interface) to interact with
the cloud.
b. Application
The application may be any software or platform
that a client wants to access.
c. Service
A Cloud Services manages that which type of service
you access according to the client’s requirement.
B.Tech CSE - NMREC - CLOUD SECURITY 48
Cloud computing offers the following three type of services:
i. Software as a Service (SaaS) – It is also known as cloud
application services. Mostly, SaaS applications run directly through
the web browser means we do not require to download and install
these applications. Some important example of SaaS is given below.
Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco
WebEx.
ii. Platform as a Service (PaaS) – It is also known as cloud
platform services. It is quite similar to SaaS, but the difference is that
PaaS provides a platform for software creation, but using SaaS, we
can access software over the internet without the need of any platform.
Example: Windows Azure, Force.com, Magento Commerce Cloud,
OpenShift.
B.Tech CSE - NMREC - CLOUD SECURITY 49
iii. Infrastructure as a Service (IaaS) – It is also known as cloud
infrastructure services. It is responsible for managing applications
data, middleware, and runtime environments.
Example: Amazon Web Services (AWS) EC2, Google Compute
Engine (GCE), Cisco Metapod.
iv. Runtime Cloud -
Runtime Cloud provides the execution and runtime
environment to the virtual machines.
v. Storage -
Storage is one of the most important components of cloud
computing. It provides a huge amount of storage capacity in the
cloud to store and manage data.
B.Tech CSE - NMREC - CLOUD SECURITY 50
vi. Infrastructure -
It provides services on the host level, application level,
and network level. Cloud infrastructure includes hardware and
software components such as servers, storage, network devices,
virtualization software, and other storage resources that are needed to
support the cloud computing model.
vii. Management -
Management is used to manage components such as
application, service, runtime cloud, storage, infrastructure, and other
security issues in the backend and establish coordination between them.
viii. Security -
Security is an in-built back end component of cloud computing.
It implements a security mechanism in the back end.
ix. Internet
The Internet is medium through which front end and back end
can interact and communicate with each other.
B.Tech CSE - NMREC - CLOUD SECURITY 51
How does Cloud Computing Work?
Assume that you are an executive at a very big corporation. Your
particular responsibilities include to make sure that all of your
employees have the right hardware and software they need to do their
jobs. To buy computers for everyone is not enough. You also have to
purchase software as well as software licenses and then provide these
software’s to your employees as they require. Whenever you hire a new
employee, you need to buy more software or make sure your current
software license allows another user. It is so stressful that you have to
spend lots of money.
But, there may be an alternative for executives like you. So, instead of
installing a suite of software for each computer, you just need to load one
application. That application will allow the employees to log-in into a
Web-based service which hosts all the programs for the user that is
required for his/her job. Remote servers owned by another company
and that will run everything from e-mail to word processing to complex
data analysis programs. It is called cloud computing, and it could change
the entire computer industry.
B.Tech CSE - NMREC - CLOUD SECURITY 52
In a cloud computing system, there is a
significant workload shift. Local
computers have no longer to do all the
heavy lifting when it comes to run
applications. But cloud computing can
handle that much heavy load easily and
automatically. Hardware and software
demands on the user's side decrease.
The only thing the user's computer
requires to be able to run is the cloud
computing interface software of the
system, which can be as simple as a Web
browser and the cloud's network takes
care of the rest.
B.Tech CSE - NMREC - CLOUD SECURITY 53
Thank
You
B.Tech CSE - NMREC - CLOUD SECURITY 54

More Related Content

Similar to cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx

Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questionspiyushchawala
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadFaisal Shehzad
 
cloud computing
cloud computingcloud computing
cloud computingnewme19
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Clpud-Computing-PPT-2.pptx
Clpud-Computing-PPT-2.pptxClpud-Computing-PPT-2.pptx
Clpud-Computing-PPT-2.pptxAnjanaPundir
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxPiyush793067
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxssuserf71896
 
Clpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxClpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxaravym456
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
security in cloud computing
security in cloud computingsecurity in cloud computing
security in cloud computingEr. Saba karim
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
 

Similar to cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx (20)

Cloud Computing Interview Questions
Cloud Computing Interview QuestionsCloud Computing Interview Questions
Cloud Computing Interview Questions
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Cloud Computing By Faisal Shehzad
Cloud Computing By Faisal ShehzadCloud Computing By Faisal Shehzad
Cloud Computing By Faisal Shehzad
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud management
Cloud managementCloud management
Cloud management
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud_computing Notes.docx
Cloud_computing Notes.docxCloud_computing Notes.docx
Cloud_computing Notes.docx
 
Clpud-Computing-PPT-2.pptx
Clpud-Computing-PPT-2.pptxClpud-Computing-PPT-2.pptx
Clpud-Computing-PPT-2.pptx
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptx
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptx
 
Clpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxClpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptx
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
security in cloud computing
security in cloud computingsecurity in cloud computing
security in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx

  • 1.
  • 3. What is Cloud Computing? B.Tech CSE - NMREC - CLOUD SECURITY 3
  • 4. What is Cloud Computing? B.Tech CSE - NMREC - CLOUD SECURITY 4
  • 5. Everything on the cloud B.Tech CSE - NMREC - CLOUD SECURITY 5
  • 6. Why Cloud Computing B.Tech CSE - NMREC - CLOUD SECURITY 6
  • 7. History and Origins B.Tech CSE - NMREC - CLOUD SECURITY 7
  • 8. Essential Characteristics Cloud Computing B.Tech CSE - NMREC - CLOUD SECURITY 8
  • 9. B.Tech CSE - NMREC - CLOUD SECURITY 9
  • 10. Cloud Service Layers B.Tech CSE - NMREC - CLOUD SECURITY 10
  • 11. Cloud Service Models Definition B.Tech CSE - NMREC - CLOUD SECURITY 11
  • 12. Cloud Service Models Characteristics B.Tech CSE - NMREC - CLOUD SECURITY 12
  • 13. Inside a CLoud B.Tech CSE - NMREC - CLOUD SECURITY 13
  • 14. B.Tech CSE - NMREC - CLOUD SECURITY 14
  • 15. Cloud Service Models Comparision B.Tech CSE - NMREC - CLOUD SECURITY 15
  • 16. Cloud Implementation Types B.Tech CSE - NMREC - CLOUD SECURITY 16
  • 17. Public Cloud B.Tech CSE - NMREC - CLOUD SECURITY 17
  • 18. Private Cloud B.Tech CSE - NMREC - CLOUD SECURITY 18
  • 19. Community Cloud B.Tech CSE - NMREC - CLOUD SECURITY 19
  • 20. Hybrid Cloud B.Tech CSE - NMREC - CLOUD SECURITY 20
  • 21. B.Tech CSE - NMREC - CLOUD SECURITY 21
  • 22. B.Tech CSE - NMREC - CLOUD SECURITY 22
  • 23. B.Tech CSE - NMREC - CLOUD SECURITY 23
  • 24. B.Tech CSE - NMREC - CLOUD SECURITY 24
  • 25. B.Tech CSE - NMREC - CLOUD SECURITY 25
  • 26. B.Tech CSE - NMREC - CLOUD SECURITY 26
  • 27. B.Tech CSE - NMREC - CLOUD SECURITY 27
  • 28. B.Tech CSE - NMREC - CLOUD SECURITY 28
  • 29. B.Tech CSE - NMREC - CLOUD SECURITY 29
  • 30. B.Tech CSE - NMREC - CLOUD SECURITY 30
  • 31. B.Tech CSE - NMREC - CLOUD SECURITY 31
  • 32. B.Tech CSE - NMREC - CLOUD SECURITY 32
  • 33. B.Tech CSE - NMREC - CLOUD SECURITY 33
  • 34. B.Tech CSE - NMREC - CLOUD SECURITY 34
  • 35. B.Tech CSE - NMREC - CLOUD SECURITY 35
  • 36. B.Tech CSE - NMREC - CLOUD SECURITY 36
  • 37. B.Tech CSE - NMREC - CLOUD SECURITY 37
  • 38. B.Tech CSE - NMREC - CLOUD SECURITY 38
  • 39. B.Tech CSE - NMREC - CLOUD SECURITY 39
  • 40. B.Tech CSE - NMREC - CLOUD SECURITY 40
  • 41. B.Tech CSE - NMREC - CLOUD SECURITY 41
  • 42. B.Tech CSE - NMREC - CLOUD SECURITY 42
  • 43. B.Tech CSE - NMREC - CLOUD SECURITY 43
  • 44. Cloud Computing Architecture B.Tech CSE - NMREC - CLOUD SECURITY 44
  • 45. As we know, cloud computing technology is used by both small and large organizations to store the information in cloud and access it from anywhere at any time using the internet connection. • Cloud computing architecture is a combination of service-oriented architecture and event-driven architecture. • Cloud computing architecture is divided into the following two parts – o Front End o Back End B.Tech CSE - NMREC - CLOUD SECURITY 45
  • 46. The below diagram shows the architecture of cloud computing - B.Tech CSE - NMREC - CLOUD SECURITY 46
  • 47. Front End The front end is used by the client. It contains client-side interfaces and applications that are required to access the cloud computing platforms. The front end includes web servers (including Chrome, Firefox, internet explorer, etc.), thin & fat clients, tablets, and mobile devices. Back End The back end is used by the service provider. It manages all the resources that are required to provide cloud computing services. It includes a huge amount of data storage, security mechanism, virtual machines, deploying models, servers, traffic control mechanisms, etc. B.Tech CSE - NMREC - CLOUD SECURITY 47
  • 48. Components of Cloud Computing Architecture There are the following components of cloud computing architecture - a. Client Infrastructure Client Infrastructure is a Front end component. It provides GUI (Graphical User Interface) to interact with the cloud. b. Application The application may be any software or platform that a client wants to access. c. Service A Cloud Services manages that which type of service you access according to the client’s requirement. B.Tech CSE - NMREC - CLOUD SECURITY 48
  • 49. Cloud computing offers the following three type of services: i. Software as a Service (SaaS) – It is also known as cloud application services. Mostly, SaaS applications run directly through the web browser means we do not require to download and install these applications. Some important example of SaaS is given below. Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco WebEx. ii. Platform as a Service (PaaS) – It is also known as cloud platform services. It is quite similar to SaaS, but the difference is that PaaS provides a platform for software creation, but using SaaS, we can access software over the internet without the need of any platform. Example: Windows Azure, Force.com, Magento Commerce Cloud, OpenShift. B.Tech CSE - NMREC - CLOUD SECURITY 49
  • 50. iii. Infrastructure as a Service (IaaS) – It is also known as cloud infrastructure services. It is responsible for managing applications data, middleware, and runtime environments. Example: Amazon Web Services (AWS) EC2, Google Compute Engine (GCE), Cisco Metapod. iv. Runtime Cloud - Runtime Cloud provides the execution and runtime environment to the virtual machines. v. Storage - Storage is one of the most important components of cloud computing. It provides a huge amount of storage capacity in the cloud to store and manage data. B.Tech CSE - NMREC - CLOUD SECURITY 50
  • 51. vi. Infrastructure - It provides services on the host level, application level, and network level. Cloud infrastructure includes hardware and software components such as servers, storage, network devices, virtualization software, and other storage resources that are needed to support the cloud computing model. vii. Management - Management is used to manage components such as application, service, runtime cloud, storage, infrastructure, and other security issues in the backend and establish coordination between them. viii. Security - Security is an in-built back end component of cloud computing. It implements a security mechanism in the back end. ix. Internet The Internet is medium through which front end and back end can interact and communicate with each other. B.Tech CSE - NMREC - CLOUD SECURITY 51
  • 52. How does Cloud Computing Work? Assume that you are an executive at a very big corporation. Your particular responsibilities include to make sure that all of your employees have the right hardware and software they need to do their jobs. To buy computers for everyone is not enough. You also have to purchase software as well as software licenses and then provide these software’s to your employees as they require. Whenever you hire a new employee, you need to buy more software or make sure your current software license allows another user. It is so stressful that you have to spend lots of money. But, there may be an alternative for executives like you. So, instead of installing a suite of software for each computer, you just need to load one application. That application will allow the employees to log-in into a Web-based service which hosts all the programs for the user that is required for his/her job. Remote servers owned by another company and that will run everything from e-mail to word processing to complex data analysis programs. It is called cloud computing, and it could change the entire computer industry. B.Tech CSE - NMREC - CLOUD SECURITY 52
  • 53. In a cloud computing system, there is a significant workload shift. Local computers have no longer to do all the heavy lifting when it comes to run applications. But cloud computing can handle that much heavy load easily and automatically. Hardware and software demands on the user's side decrease. The only thing the user's computer requires to be able to run is the cloud computing interface software of the system, which can be as simple as a Web browser and the cloud's network takes care of the rest. B.Tech CSE - NMREC - CLOUD SECURITY 53
  • 54. Thank You B.Tech CSE - NMREC - CLOUD SECURITY 54

Editor's Notes

  1. https://data-flair.training/blogs/cloud-computing-tutorials-home/
  2. https://data-flair.training/blogs/cloud-computing-tutorials-home/