Elizabeth Muli Technical University of Kenya & James Kimutai Moi University 1.

Slides:



Advertisements
Similar presentations
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
GREEN CLOUD By Sphoorthy. LOGO WHAT IS CLOUD COMPUTING? Cloud computing is a model for enabling convenient, on- demand network access to a shared pool.
Security Issues and Challenges in Cloud Computing
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
SaaS, PaaS & TaaS By: Raza Usmani
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
Cloud computing Tahani aljehani.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
EA and IT Infrastructure - 1© Minder Chen, Stages in IT Infrastructure Evolution Mainframe/Mini Computers Personal Computer Client/Sever Computing.
Discussion on LI for Mobile Clouds
Travis, Stephanie, Alex.  Cloud computing is a general term for anything that involves delivering hosted services over the Internet.  These services.
Plan Introduction What is Cloud Computing?
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Security and Privacy: Can we trust the cloud?
Cloud Computing.
Osama Shahid ( ) Vishal ( ) BSCS-5B
For more notes and topics visit:
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Computer Science and Engineering 1 Cloud ComputingSecurity.
In the name of God :).
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Paperless Timesheet Management Project Anant Pednekar.
Chapter 8 – Cloud Computing
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Web Technologies Lecture 13 Introduction to cloud computing.
Bay Ridge Security Consulting (BRSC) Cloud Computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
RANDY MODOWSKI COSC Cloud Computing. Road Map What is Cloud Computing? History of “The Cloud” Cloud Milestones How Cloud Computing is being used.
PRESENTED BY– IRAM KHAN ISHITA TRIPATHI GAURAV AGRAWAL GAURAV SINGH HIMANSHU AWASTHI JAISWAR VIJAY KUMAR JITENDRA KUMAR VERMA JITENDRA SINGH KAMAL KUMAR.
Cloud Powered Rural Telecenters – A Model for Sustainable Telecenters Osman Ghazali, Baharudin Osman, Azizah Ahmad, Azizi Abas, Abdul Razak Rahmat, Mohamed.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Chapter 6: Securing the Cloud
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Cloud Computing.
Chapter 22: Cloud Computing Technology and Security
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
CLOUD COMPUTING Presented By:- EduTechlearners
Cloud Testing Shilpi Chugh.
Cloud Computing Dr. Sharad Saxena.
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
"Cloud services" - what it is.
Cloud Computing: Concepts
Computer Science and Engineering
Presentation transcript:

Elizabeth Muli Technical University of Kenya & James Kimutai Moi University 1

Content Definition Types of Clouds Motivation and Problem area Research Questions Research Objectives Materials and Methods Analysis and results Conclusion and Outlook 2

Definition Cloud computing is a new model based on grid computing, distributed computing, parallel computing and virtualization technologies. It is used for hosting resources and providing services to consumers. It offers a convenient, on-demand access to a centralized shared pool of computing resources that can be deployed with minimum management overheads and at the same time realize great efficiency ( Chandra, & Borah2012) National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can rapidly be provisioned and released with minimal management effort or service provider interaction ( Mell & Grance, 2011). 3

Types of Clouds Infrastructure as a service (IaaS) - This is the lowest level and it provides virtualized servers, networks, storage, and system software. Platform as a service (PaaS) - This is the middle level and it enables customers to install their own applications using a platform specified by the service provider. Example the Google Apps Engine where developers can write and install applications Soft ware as a service (SaaS) – This is the highest level of cloud computing and the most common in education. Data and applications are stored in the cloud and the users only require a web browser to access them. Examples are Google Apps for Education and Microsoft which provide communication and office applications such as and spreadsheets. 4

Potential of Cloud Computing for universities in Kenya? The benefits of cloud computing for universities? Challenges of cloud computing for universities? Services currently deployed in universities? 5

What is the extent of cloud computing adoption in Kenyan Universities? What are the technical requirements for cloud computing? What is the impact of adopting cloud computing for universities? How can the universities exploit the full potential of cloud computing? 6

To find out the current status of cloud computing adoption in Kenyan Universities To determine if the universities have the right infrastructure and human expertise in place To assess the impact of adopting cloud computing in Kenyan Universities To find out what is hindering deployment of cloud computing in our universities Make recommendations on how to exploit the full potential of cloud computing 7

Study adopts a SWOT analysis Strengths - internal attributes and resources that support a successful outcome. Weaknesses - internal attributes resources that work against a successful outcome. Opportunities - external factors the universities can capitalize on or use to its advantage. Threats - external factors that could jeopardize the outcomes. Data was gathered through interviews. The target population was 10 universities which include 5 public universities and 5 private universities The population sample comprised of ICT officers and ICT manager or ICT directors, Directors of schools and students. 8

Reduces costs such as infrastructure, labour, improved efficiency, licensing of software especially proprietary software Increased productivity by trying new ideas without investing on the technologies Universities are able to scale up usage as required Disaster recovery and business continuity plans Environmental conservation due to reduction in carbon emissions Increased competitiveness since universities are able to concentrate on their core business i.e. Education, training and research Flexibility since cloud services can be accessed from anywhere Pay as you go basis enabling universities to pay for only what they need Strengths 9

Cloud services are Internet dependent and this affects availability of these services Insufficient bandwidth to serve the user communities effectively Poor network design infrastructures which limit the optimal utilization of available bandwidth Lack of skills and expertise of the technical staff such as security of the network and data, architecture and design skills of this technology Lack of policies and legal frameworks on deployment of cloud computing services Regulatory uncertainties since users are not able to influence the technical architecture of cloud services Weaknesses 10

Cloud services are offer reliable services to the users Fault tolerance since there is no single point of failure This technology offers state of art technologies to the universities without having to invest in them Universities are able to deploy virtualization and these reduces the cost of acquiring required hardware Expose students to new technologies making them more creative and innovative Provide opportunities to enhancing research and partnerships Opportunities 11

Data breaches:- This occurs when sensitive data falls into the wrong hands This can happen if a multitenant cloud service database is not properly designed, a flaw in one client’s application can be used by an attacker access not only to that client’s data, but every other client’s data as well. Data Loss:- This can be as a result of accidental deletion or disasters. Offsite backups as a disaster recovery plan Account or service traffic hijacking:- Attack methods such as phishing, fraud and exploitation of software vulnerabilities can be used to users credentials. Once this is done an attacker can eavesdrop on users’ activities and transactions, manipulate data, return falsified information, and redirect them to illegitimate sites Threats 12

Insecure interfaces and APIs:- Cloud computing offers software APIs that customers use to manage and interact with cloud services. Security and availability of the cloud services depends on these APIs and they must be designed to protect users from malicious attacks Denial of Service:- Attackers can cause the cloud service to consume vast amounts of resources such as processing power, memory, disk space and network bandwidth leading to intolerable slowdown. Internal attacks:- This mainly from malicious insiders who can be employees, former employees and contractors who has or had authorized access and they can use it to negatively affect the confidentiality, Availability and Integrity of data. 13

Abuse of cloud services since there is no regulatory framework:- Cloud computing offers vast amounts of computing and not uses this power for good intentions Insufficient due diligence:- many organizations are carried away by the promises such as cost reductions and operational efficiencies without understanding the full scope of the CSP environment Shared technology issues:- with shared vulnerabilities a single vulnerability or misconfiguration can lead to a compromise across an entire provider’s cloud. 14

Cloud computing is still very new and a lot of sensitization on the potential and benefits of this technology need to be done. Some universities have deployed private clouds within their intranet to support research and digital repositories. Most of the universities interviewed are using SaaS cloud services for students’ s. A few universities are using IaaS through renting storage space for offsite backups PaaS is not common in these universities because of the following concerns:- Privacy and security concerns especially for their data Availability especially when no internet connection The technology requires expertise to deploy 15

Adoption of cloud computing will enhancing teaching and learning Adoption of cloud computing universities will cut down on operational costs especially with the decreasing capitation from the government and enable universities leverage state of the art technologies and concentrate on their core business for increased productivity. Awareness should be done to send accurate information to potential consumers. Policy and legal frameworks, regulatory standards should also be put in place to regulate the cost and protect end users by ensuring confidentiality and integrity of their data. Development of human capacity to equip them with the necessary skills and legal knowledge to ensure contracts are well formulated and managed. 16

Thank you Questions / Answer 17