Presentation is loading. Please wait.

Presentation is loading. Please wait.

A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

Similar presentations


Presentation on theme: "A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )"— Presentation transcript:

1 A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )

2 Agenda  Introduction  Cloud Computing Model  Advantages and Disadvantages  Identified some security issues  Conclusion

3 Introduction The definition of cloud computing provided by the National Institute of Standards and Technology (NIST) "Cloud computing is a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage applications and services) that can be rapidly Provisioned and released with minimal management effort or service provider interaction ”.

4 Cloud Computing Model

5 There are mainly 3 service models given as: 1. Software as a Service (SaaS) 2. Platform as a Service (PaaS) 3. Infrastructure as a Service (IaaS)

6  In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. Cloud users do not manage the cloud infrastructure and platform where the application runs. This eliminates the need to install and run the application on the cloud user's own computers, which simplifies maintenance and support.  Examples of SaaS include: Google Apps, Microsoft Office 365, Onlive, GT Nexus, Marketo, and TradeCard.Google AppsMicrosoft Office 365 OnliveGT NexusMarketoTradeCard SaaS

7 PaaS In the PaaS model, cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. Examples of PaaS include: AWS Elastic Beanstalk, Cloud Foundry, Heroku, Force.com, EngineYard, Mendix, OpenShift, Google App Engine, Windows Azure Cloud Services and OrangeScapeAWS Elastic BeanstalkCloud FoundryHerokuForce.comEngineYardMendixOpenShift Google App EngineWindows Azure Cloud Services OrangeScape

8 IaaS In this model, providers of IaaS offer computers physical or virtual machines and other resources. IaaS clouds often offer additional resources such as a virtual-machine disk image library, raw (block) and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. IaaS- cloud providers supply these resources on-demand from their large pools installed in data centers.disk image virtual local area networksdata centers Examples of IaaS providers include: Amazon EC2, Azure Services Platform, Google Compute Engine, HP Cloud, iland, Joyent, NaviSite, RackspaceCloud, ReliaCloud, SAVVIS, and Terremark.Amazon EC2Azure Services PlatformGoogle Compute EngineHP CloudilandJoyent NaviSiteRackspaceCloudReliaCloudSAVVISTerremark

9

10

11 Some Cloud Service Providers Utility Computing Platform as a Service (PaaS) Cloud-based User Applications

12 Cloud Deployment Models 1.Public Cloud 2.Private Cloud 3.Hybrid Cloud

13

14 Advantages  Lower computer costs.  Improved performance.  Reduced software costs.  Instant software updates.  Unlimited storage capacity.  Increased data reliability.  Universal document access.  Latest version availability.  Device independence.

15 Disadvantages  Requires a constant Internet connection.  Does not work well with low-speed connections.  Features might be limited.  Can be slow.  Stored data might not be secure.  Stored data can be lost.

16 Security Issues in the Cloud –Loss of Control Take back control –Data and apps may still need to be on the cloud –But can they be managed in some way by the consumer? –Lack of trust Increase trust (mechanisms) –Technology –Policy, regulation –Multi-tenancy Private cloud –Takes away the reasons to use a cloud in the first place Strong separation

17

18 Conclusion Cloud computing provide a super-computing power. This cloud of computers extends beyond a single company or enterprise. The applications and data served by the cloud are available to broad group of users, cross-enterprise and cross-platform. In developing solutions to cloud computing security issues it may be helpful to identify the problems and approaches in terms of –Loss of control –Lack of trust –Multi-tenancy problems

19 References 1. Ding Feng, Min Zhang, Yan Zhang, and Zhen Xu, “The research of cloud security”. Journal of Software, 22 (1), 2011. 2.I. Altman, “Privacy Regulation Culturally Universal or Culturally Specific”, Journal of Social Issues, 33 (3), 1997, 66-84. 3.John Harauz, Lorti M. Kaufman. Bruce Potter, "Data Security in the World of Cloud Computing", IEEE Security & Privacy, Co published by the IEEE Computer and Reliability Societies, July/August 2009. 4.Mladen A. Vouch, “Cloud Computing Issues, Research and Implementations”, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246 5.R.J. Board, and R. Srikant, “Technological Solutions for Protecting Privacy”, IEEE Computer, 36 (9), 2003, 115-118.

20 6.A. Cavoukian and T. Hamilton, Information and Privacy commissioner of Ontario, Digital Age, McGraw-Hill, 2002. 7.S. Hecht and A. Cockburn, The fate of the forest: developers, destroyers, and de-fenders of the Amazon. University Of Chicago Press, 2011. 8.F. Shimba, “Cloud Computing: Strategies for Cloud Computing Adoption,” Masters Dissertation, Dublin Institute of Technology, 2010. 9.A.C. Berglund, E. Elmroth, F. Hernndez, B. Sandman, and J. Tordsson, “Combining local and Grid resources in scientific workflows (for Bioinformatics),” 9th International Workshop, PARA, Citeseer, 2008. 10.C. Moretti, K. Steinhaeuser, D. Thain, and N.V. Chawla, “Scaling up Classifiers to Cloud Computers,” Eighth IEEE International Conf. On Data Mining, Dec. 2008, 472-481. 11.C. Wang, Q. Wang, K. Ren, and W. Lou.,” Ensuring data storage security in cloud computing”, 17th International Workshop on Quality of Service, IWQoS., 2009, p.19.

21 12. F. Amnesty et al., “Cross layer Privacy Enhancement and Non-Repudiation in Vehicular Communication ” 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern Switzerland, March 2007. 13.Flavio Lombardi& Roberto DI Pietro, “Transparent Security for Cloud”, (SAC 10), Sierre, Switzerland, March 22-26, 2010. 14.L.J. Zhang and Q. Zhou, “CCOA: Cloud Computing Open Architecture,” IEEE Int. Conf. With Web Services, Jul.2009, 607-616. 15.Marios D. Dikaiakos, George Pall is, DimitriosKatsaros, Pankaj Mehra, Athena Vakali, "Cloud computing: Distributed Internet Computing for IT and Scientific Research", IEEE Internet Computing, Published by the IEEE Computer Society, September/October 2009. 16.R. Buyya, C.S. Yale, and S. Venugopal, “Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing, Utilities”, Proceeding of the HPCC 08, 10th IEEE International Conf. On High Performance Computing and Communications (HPCC 08), 2008, 5-13.

22 17.R. La,”Quata Sumter, Cloud Computing: Security Risk Classification”, ACMSE 2010, Oxford, USA, 2010. 18.Rongxing et al, Secure Provenance,” The Essential Bread and Butter of Data Forensics”, in Cloud Computing, (ASIACCS 10), Beijing, China, 2010. 19.S.C. Misra and A. Mondal, “Identification of a company’s suitability for the adoption of cloud computing and modeling its corresponding Return on Investment,” Mathematical and Computer Modelling, 53, Feb. 2011, 504-521. 20.Soren Bleikertz et al, “Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds” CCSW 2010, Chicago, USA. 21.S. Ostermann, A. Iosup, N. Yigitbasi, R. Prodan, T. Fahringer, and D. Epema, “A performance analysis of EC2 cloud computing services for scientific computing,” Cloud Computing, Springer,2010, 115-131. 22.S. Yilek, E. Rescorla, H. Shacham, B. Enright, and S. Savage, “when private keys are public: results from the 2008 debian OpenSSL vulnerability”, in: Proc. 9th ACM SIGCOMM conf. At Internet measurement conference, 2009.

23 Thank You


Download ppt "A New Era of Computing: Cloud Computing Presented by: Deepak Kumar Verma (ID: NCRAET-113 )"

Similar presentations


Ads by Google