Cloud computing and Cloud Security - Basics and Terminologies
-
Upload
manpreet-kaur -
Category
Technology
-
view
65 -
download
1
Transcript of Cloud computing and Cloud Security - Basics and Terminologies
Cloud ComputingAnd Cloud Security
What is Cloud Computing?
Cloud Computing is an internet basedservice that provides on demand access toshared computer resources and data. Inother words, cloud computing meansdelivery of hosted services and resourcesover the internet. These resources includestorage, server, network and applications.These resources can be quickly equippedand can be freed easily. Virtualization isthe driving force behind cloud computing.
Virtualization in Cloud Computing
Virtualization means the creation of virtualresources rather than actual resources likehardware, operating system, storage, networketc. These virtual resources act as a replicaof the actual resources. The common exampleof virtualization is the partition of thehard drive to create separate hard drives. Invirtualization, there are two types ofmachines host machine and the guest machine.Host machine is the real physical machine onwhich virtualization takes place while theguest machine is the virtual machine.
Types of Virtualization
Hardware Virtualization
Operating System Virtualization
Desktop Virtualization
Storage Virtualization
Network Virtualization
Characteristics of Cloud Computing
On-demand self-service
Broad network access
Resource pooling
Rapid Elasticity
Measured Service
Cloud Services or Cloud Service Model
IaaS(Infrastructure as a Service)
PaaS(Platform as a Service)
SaaS(Software as a Service)
Infrastructure as a Service(IaaS)
Infrastructure as a Service provides virtual computing resources such as storage, server, virtual machines and network over the internet. A third party provider provides this infrastructure to the consumer.
Platform as a Service(PaaS)
Platform as a Service allows the consumer to deploy applications on the cloud infrastructure. A consumer is not responsible for the underlying cloud infrastructure.
Software as a Service(SaaS)
Software as a Service enables the user to use the deployed applications running on the cloud infrastructure. The consumer is not responsible for managing the underlying infrastructure and the applications.
Cloud Deployment Model
Public Cloud
Private Cloud
Hybrid Cloud
Community Cloud
Public Cloud - Public Cloud is for public use or a large organization and is owned by a third party provider selling cloud services.
Private Cloud - Private Cloud is provided for a single organization with multiple consumers. It is operated by the organization itself or by a third party. It may be operated within the premises or off the premises.
Hybrid Cloud - Hybrid Cloud is a combination of two or more distinct clouds that retain their unique entity. It is used for sensitive data and strategic applications.
Community Cloud - It is a type of private cloud for users with specific demands. It has several stakeholders. It is managed by the organization or by a third party provider.
Advantages of Cloud Computing
It is cost effective
It is based on pay per use method
Improved security
It is much more reliable and manageable
It is flexible, scalable and also environment-friendly as it reduces carbon footprint
Drawbacks of Cloud Computing
Security and privacy issues while using services from third party providers
As it is an internet based service, it faces the risk of downtime i.e. internet breakdown or connection problems
It is prone to cyber attacks Vendor lock-in – It is a situation when a consumer wants to switch to other vendor’s services but cannot easily shift without paying a considerable cost.
Cloud Security
Cloud Computing security refers to setof policies and measures deployed toprotect cloud infrastructure and theunderlying data and applications. It isa part of information security. CloudComputing Security is needed as thereare certain security concerns regardingsecurity and privacy of the users andtheir data.
Controls in Cloud Security
Deterrent Control
Preventive Control
Detective Control
Corrective Control
Topics in Cloud Computing and Cloud Security for Research and Thesis
Virtualization
Denial of Service
Encryption
DDoS Attack
Cloud Security Dimensions
Identity Management
Data Security
Data Separation
Thank You
Reference: Techsparks
Techsparks, 2nd floor, D-185, Phase 8B, Industrial Area, Sahibzada AjitSingh Nagar, Mohali, Punjab 160055http://www.techsparks.co.in
+91-7696666022